Kim Zetter

Hacking

Researchers Uncover New Version of the Infamous Flame Malware

They also found evidence that Stuxnet has ties to another malware family. The discoveries were made using tools and techniques only available to researchers in recent years.
Kim Zetter
4.9.19
supply chain

Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers

The Taiwan-based tech giant ASUS is believed to have pushed the malware to hundreds of thousands of customers through its trusted automatic software update tool after attackers compromised the company’s server and used it to push the malware to machines.
Kim Zetter
3.25.19
Election Security

DARPA Is Building a $10 Million, Open Source, Secure Voting System

The system will be fully open source and designed with newly developed secure hardware to make the system not only impervious to certain kinds of hacking, but also allow voters to verify that their votes were recorded accurately.
Kim Zetter
3.14.19
evoting

Researchers Find Critical Backdoor in Swiss Online Voting System

Researchers have found a severe issue in the new Swiss internet voting system that they say would let someone alter votes undetected. They say it should put a halt to Switzerland’s plan to roll out the system in real elections this year.
Kim Zetter
3.12.19
Election Security

Experts Find Serious Problems With Switzerland's Online Voting System Before Public Penetration Test Even Begins

The public penetration test doesn’t begin until next week, but experts who examined leaked code for the Swiss internet voting system say it’s poorly designed and makes it difficult to audit the code for security and configure it to operate securely.
Kim Zetter
2.21.19
privacy

Apple's Security Expert Joined the ACLU to Tackle 'Authoritarian Fever'

Apple security expert Jon Callas, who helped build protection for billions of computers and smartphones against criminal hackers and government surveillance, is now taking on government and corporate spying in the policy realm.
Kim Zetter
1.22.19
Election Security

Voting Machine Manual Instructed Election Officials to Use Weak Passwords

A vendor manual for voting machines used in about ten states shows the vendor instructed customers to use trivial, easy to crack passwords and to re-use the passwords when changing log-in credentials.
Kim Zetter
11.5.18
Election Hacking

Texas Voting Machines Have Been ‘a Known Problem’ for a Decade

The voting machines and their software—not voters—are to blame for votes switching from Beto O'Rourke to Ted Cruz (and vice versa), an expert told Motherboard.
Kim Zetter
10.30.18
Election Security

Security Seals Used to Protect Voting Machines Can Be Easily Opened With Shim Crafted from a Soda Can

Election officials say security ties and seals prevent anyone with physical access to voting machines from manipulating them. But a researcher has shown how he can easily defeat them with a soda can.
Kim Zetter
10.16.18
CFAA

Justice Department Warns It Might Not Be Able to Prosecute Voting Machine Hackers

DoJ says current federal law against hacking doesn't apply to voting machines because they aren't connected to the internet; but this plus a proposed amendment could create a problem for prosecuting hacks of other computers not connected to the internet.
Kim Zetter
8.30.18
privacy

Video Shows Hotel Security at DEF CON Joking About Posting Photos of Guests' Belongings to Snapchat

Caesars Palace told DEF CON attendees that hotel security room check only involved 'visual review,' but a video shows some security staff going further.
Kim Zetter
8.15.18
pcAnywhere

Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States

Remote-access software and modems on election equipment 'is the worst decision for security short of leaving ballot boxes on a Moscow street corner.'
Kim Zetter
7.17.18
0103